Systems and methods for post-quantum cryptography optimization

    公开(公告)号:US11750378B1

    公开(公告)日:2023-09-05

    申请号:US17930754

    申请日:2022-09-09

    CPC classification number: H04L9/0852 G06F21/577 G06F21/602

    Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for each PQC cryptographic technique in the set of PQC cryptographic techniques. The example method further includes generating a set of PQC encryption attributes for encrypting the data based on the set of data attributes, the risk profile data structure, and the PQC cryptographic performance information. Subsequently, the example method includes encrypting the data based on the set of PQC encryption attributes.

    MULTIFACTOR IDENTITY AUTHENTICATION VIA CUMULATIVE DYNAMIC CONTEXTUAL IDENTITY

    公开(公告)号:US20230273989A1

    公开(公告)日:2023-08-31

    申请号:US18143498

    申请日:2023-05-04

    Inventor: Peter Bordow

    Abstract: Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user’s digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user’s accounts.

    Systems and methods for post-quantum cryptography optimization

    公开(公告)号:US11477016B1

    公开(公告)日:2022-10-18

    申请号:US16566009

    申请日:2019-09-10

    Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for each PQC cryptographic technique in the set of PQC cryptographic techniques. The example method further includes generating a set of PQC encryption attributes for encrypting the data based on the set of data attributes, the risk profile data structure, and the PQC cryptographic performance information. Subsequently, the example method includes encrypting the data based on the set of PQC encryption attributes.

    POWER SENSING VIA QUANTUM PHENOMENON DETECTION

    公开(公告)号:US20250035676A1

    公开(公告)日:2025-01-30

    申请号:US18066162

    申请日:2022-12-14

    Abstract: Detecting a level of current in a conductor such as a power line can be accomplished using sensing devices that are coupled to the line. Such devices can have a clamshell or briefcase-style shape and close about the line. The line passes through a channel between the sides of the device. A quantum substance made of a material having a phonon decay sideband is arranged nearby the channel, and a light source and a scanning source work in tandem to cause the substance to emit light that can be analyzed to determine a magnitude of a magnetic field on the substance. By distributing such sensing devices about a grid or other electrical distribution network, current throughout the network can be collected and analyzed to ascertain the presence and location of interferences with the grid.

    SYSTEMS AND METHODS FOR QUANTUM VERIFICATION OF COMMUNICATIONS

    公开(公告)号:US20250030686A1

    公开(公告)日:2025-01-23

    申请号:US17445062

    申请日:2021-08-13

    Abstract: Systems, apparatuses, methods, and computer program products are disclosed for authenticating devices. An example method includes generating pairs of entangled photons by a first device. One photon of each entangled photon pair may be transmitted to a second device. The first device and the second device may attempt to measure respective photons of the entangled photon pair to obtain a bit of a bit sequence. The bits may be encoded in the polarizations of the entangled photon pairs and may correspond to a true random number due to the generation method used by the first device. The second device may provide authentication data based on the bit sequence to the first device. The first device may use its copy of the bit sequence and the authentication data to authenticate the second device.

    MULTIFACTOR IDENTITY AUTHENTICATION VIA CUMULATIVE DYNAMIC CONTEXTUAL IDENTITY

    公开(公告)号:US20240411856A1

    公开(公告)日:2024-12-12

    申请号:US18808513

    申请日:2024-08-19

    Inventor: Peter Bordow

    Abstract: Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user's digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user's accounts.

Patent Agency Ranking